In IZArc through 4.5, there is a Mark-of-the-Web Bypass Vulnerability. When a user performs an extraction from an archive file that bears Mark-of-the-Web, Mark-of-the-Web is not propagated to the extracted files. NOTE: this is disputed because Mark-of-the-Web propagation can increase risk via security-warning habituation, and because the intended control sphere for file-origin metadata (e.g., HostUrl in Zone.Identifier) may be narrower than that for reading the file's content.
References
Configurations
No configuration.
History
No history.
Information
Published : 2025-04-26 18:15
Updated : 2025-10-24 20:16
NVD link : CVE-2025-46652
Mitre link : CVE-2025-46652
CVE.ORG link : CVE-2025-46652
JSON object : View
Products Affected
No product.
CWE
CWE-830
Inclusion of Web Functionality from an Untrusted Source
